{"id":1785,"date":"2020-03-02T07:43:38","date_gmt":"2020-03-02T06:43:38","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1785"},"modified":"2020-03-03T07:46:47","modified_gmt":"2020-03-03T06:46:47","slug":"plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/","title":{"rendered":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY"},"content":{"rendered":"\n<p>WordPress\nest certainement la plateforme de cr\u00e9ation de sites la plus populaire. Selon\nles statistiques actuelles, la technologie fournit sa plate-forme de gestion de\ncontenu \u00e0 environ 35% de tous les internautes.<\/p>\n\n\n\n<p>La\ntechnologie a toujours attir\u00e9 <strong><a href=\"https:\/\/koddos.net\/blog\/remines-security-vulnerability-sends-open-invitation-to-hackers\/\">hackers\net cyber-attaquants<\/a><\/strong> en raison de son nombre impressionnant\nd&rsquo;installations. C&rsquo;est pourquoi les tentatives de piratage sur les sites\nWordPress font toujours la une des journaux.&nbsp;\n<\/p>\n\n\n\n<p>La\nderni\u00e8re ann\u00e9e a \u00e9t\u00e9 l&rsquo;une des plus actives pour les hackers qui s&rsquo;int\u00e9ressent\naux sites WordPress, car il y a eu un grand nombre d&rsquo;attaques et de tentatives\nd&rsquo;attaques.<\/p>\n\n\n\n<p>Apr\u00e8s\nle nombre \u00e9lev\u00e9 d&rsquo;attaques <strong><a href=\"https:\/\/koddos.net\/blog\/200000-sites-at-risk-of-attack-due-to-vulnerable-wordpress-plugin\/\">sur\nWordPress<\/a><\/strong> vers la fin de l&rsquo;ann\u00e9e derni\u00e8re, la nouvelle ann\u00e9e a\ncommenc\u00e9 sur une note calme pour la plate-forme de gestion de contenu. <\/p>\n\n\n\n<p>Cependant,\nil semble que la c\u00e9l\u00e9bration du charisme soit termin\u00e9e pour les hackers, car\nils sont revenus au service normal. En l&rsquo;espace de 2 semaines, plusieurs\nattaques ont \u00e9t\u00e9 signal\u00e9es. <\/p>\n\n\n\n<p>Les\nhackers ont refait surface, plusieurs chercheurs en s\u00e9curit\u00e9 ayant rapport\u00e9 un\nnombre consid\u00e9rable d&rsquo;attaques sur les sites WordPress.&nbsp; Des soci\u00e9t\u00e9s de s\u00e9curit\u00e9 comme NinTechNet,\nWebARX et WordFense ont toutes d\u00e9couvert les attaques.<\/p>\n\n\n\n<p>Plus\nr\u00e9cemment, les <strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-bugs-in-wordpress-plugins-let-hackers-take-over-sites\/\">rapports<\/a><\/strong>\nde ces chercheurs ont r\u00e9v\u00e9l\u00e9 que les hackers exploitent une vuln\u00e9rabilit\u00e9\ncritique de type \u00abzero-day\u00bb dans WordPress, qui risque de leur permettre de\nprendre le contr\u00f4le de plusieurs milliers de sites web.<\/p>\n\n\n\n<p>Les\njours z\u00e9ro dans plusieurs plugins peuvent permettre aux hackers d&rsquo;installer des\nportes d\u00e9rob\u00e9es et de mettre en place des administrateurs malveillants.<\/p>\n\n\n\n<p>Les\nchercheurs de NinTechNet <strong><a href=\"https:\/\/blog.nintechnet.com\/zero-day-vulnerability-fixed-in-wordpress-flexible-checkout-fields-for-woocommerce-plugin\/\">ont\nd\u00e9clar\u00e9<\/a><\/strong> qu&rsquo;ils ont soumis le rapport \u00e0 l&rsquo;\u00e9quipe de d\u00e9veloppement\ndu plugin WordPress pour les actions et mises \u00e0 jour n\u00e9cessaires.<\/p>\n\n\n\n<p>\u00c0\npeine une heure apr\u00e8s avoir re\u00e7u le rapport, l&rsquo;\u00e9quipe WordPress a publi\u00e9 un\ncorrectif avec la version 2.3.2 pour corriger la faille activement cibl\u00e9e.\nCependant, certains utilisateurs ont d\u00e9j\u00e0 \u00e9t\u00e9 pirat\u00e9s avant que la mise \u00e0 jour\nne soit disponible.<\/p>\n\n\n\n<p><strong>Des\nrapports ont r\u00e9v\u00e9l\u00e9 que trois autres failles zero-day ont \u00e9t\u00e9 exploit\u00e9es<\/strong><\/p>\n\n\n\n<p>La\nsoci\u00e9t\u00e9 de s\u00e9curit\u00e9 WordPress, Defiant, a d\u00e9couvert qu&rsquo;il y avait trois autres\nfailles zero-day cibl\u00e9es, ce qui affecte d&rsquo;autres plugins WordPress. Les\nchercheurs l&rsquo;<strong><a href=\"https:\/\/malware.news\/t\/hackers-are-actively-exploiting-zero-days-in-several-wordpress-plugins\/37537\">ont\nd\u00e9couvert<\/a><\/strong> au cours de l&rsquo;analyse de l&rsquo;attaque \u00abzero-day\u00bb\nactuelle.&nbsp; <\/p>\n\n\n\n<p>Les\nd\u00e9veloppeurs de 10Web Map Builder et Async JavaScript ont \u00e9galement publi\u00e9 des\nmises \u00e0 jour pour corriger les vuln\u00e9rabilit\u00e9s exploit\u00e9es.<\/p>\n\n\n\n<p>Selon\nMikey Veenstra, analyste chez Defiant Threat, \u00abcette campagne d&rsquo;attaque\nexploite les vuln\u00e9rabilit\u00e9s XSS dans les plugins ci-dessus pour injecter du\nJavascript malveillant qui peut cr\u00e9er des plugins malveillants qui comportant\ndes portes d\u00e9rob\u00e9es\u00bb. <\/p>\n\n\n\n<p>Il\na \u00e9galement <strong><a href=\"https:\/\/www.wordfence.com\/blog\/2020\/02\/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities\/\">r\u00e9it\u00e9r\u00e9\nque<\/a><\/strong> les administrateurs de sites qui utilisent les plugins\ndevraient prendre les mesures appropri\u00e9es pour mettre fin \u00e0 ces attaques.<\/p>\n\n\n\n<p>Il\na d\u00e9clar\u00e9 que l&rsquo;\u00e9quipe de Defiant Security comprend l&rsquo;importance de la\ncommunication des informations relatives \u00e0 la s\u00e9curit\u00e9, et que la soci\u00e9t\u00e9 ne\nr\u00e9v\u00e9lera pas les d\u00e9tails des vuln\u00e9rabilit\u00e9s s&rsquo;il n&rsquo;\u00e9tait pas important que la\ncommunaut\u00e9 WordPress le sache.<\/p>\n\n\n\n<p><strong>Savoir\nsi votre site WordPress est compromis ou non<\/strong><\/p>\n\n\n\n<p>Lukasz\nSpryszak, du bureau de s\u00e9curit\u00e9 de WordPress, a \u00e9num\u00e9r\u00e9 quelques sympt\u00f4mes qui\nindiqueraient que le site web d&rsquo;un utilisateur a \u00e9t\u00e9 viol\u00e9 par la campagne de\npiratage. Voici quelques-uns de ces sympt\u00f4mes : <\/p>\n\n\n\n<p>1)\nR\u00e9organisation des champs de paiement ou ajout de nouveaux champs qui n&rsquo;avaient\npas \u00e9t\u00e9 ajout\u00e9s initialement.<\/p>\n\n\n\n<p>2)\nFichiers suspects, en particulier ceux portant une extension .zip ou .php.<\/p>\n\n\n\n<p>3)\nL&rsquo;apparition de nouveaux plugins qui n&rsquo;ont pas \u00e9t\u00e9 install\u00e9s initialement.<\/p>\n\n\n\n<p>4)\nLorsque de nouveaux comptes d&rsquo;administrateur apparaissent lorsque l&rsquo;utilisateur\nsait qu&rsquo;ils n&rsquo;ont pas \u00e9t\u00e9 cr\u00e9\u00e9s par l&rsquo;utilisateur.<\/p>\n\n\n\n<p>Il\ny a eu beaucoup plus de rapports sur les vuln\u00e9rabilit\u00e9s des plugins WordPress\net l&rsquo;exploration des vuln\u00e9rabilit\u00e9s zero-day r\u00e9cemment corrig\u00e9es. Par exemple,\nla semaine derni\u00e8re, BleepingComputer a signal\u00e9 que certains hackers avaient\ntent\u00e9 de violer compl\u00e8tement les sites WordPress en explorant les versions non corrig\u00e9es\ndes plugins Duplicator, Profile Builder et ThemeGrill Demo Importal. <\/p>\n\n\n\n<p>Les\nchercheurs ont r\u00e9v\u00e9l\u00e9 qu&rsquo;il y avait environ 1 250 000 installations pour ces\nplugins vuln\u00e9rables. Avec ce grand nombre d&rsquo;installations, les attaquants\nauraient eu un plaisir fou \u00e0 exploiter les plugins s&rsquo;ils avaient r\u00e9ussi \u00e0 les\ninfiltrer.<\/p>\n\n\n\n<p>De\nm\u00eame, la semaine derni\u00e8re, des hackers ont exploit\u00e9 une vuln\u00e9rabilit\u00e9\n\u00abzero-day\u00bb qui permet l&rsquo;ex\u00e9cution de code \u00e0 distance dans le plugin WordPress\nde ThemeREX. Cette fois, le plugin compte environ 40 000 installations.&nbsp;\nLes attaquants voulaient cr\u00e9er un compte administrateur qui leur permettrait de\nprendre le contr\u00f4le total des sites Web vuln\u00e9rables.<\/p>\n\n\n\n<p>Il\nexiste d&rsquo;autres &nbsp;<strong><a href=\"https:\/\/koddos.net\/blog\/a-hacking-attack-involving-wordpress-plugins-is-targeting-vulnerable-websites\/\">plugins\nWordPress vuln\u00e9rables <\/a><\/strong>&nbsp;que les attaquants pourraient cibler, y\ncompris les multiples plugins de vuln\u00e9rabilit\u00e9 GDPR Cookie, qui ont plus de 700\n000 installations. Les attaquants peuvent exploiter ces vuln\u00e9rabilit\u00e9s et\ninjecter un bug CSRF ou du code JavaScript malveillant dans le plugin. <\/p>\n\n\n\n<p>De\nplus, deux failles ont \u00e9t\u00e9 trouv\u00e9es dans le plugin de r\u00e9initialisation de la\nbase de donn\u00e9es WordPress. Les chercheurs ont r\u00e9v\u00e9l\u00e9 que les hackers peuvent\nexploiter la vuln\u00e9rabilit\u00e9 et r\u00e9initialiser la base de donn\u00e9es des sites ou\nprendre compl\u00e8tement le contr\u00f4le des sites si les mises \u00e0 jour ne sont pas\ncompl\u00e8tement install\u00e9es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WordPress est certainement la plateforme de cr\u00e9ation de sites la plus populaire. Selon les statistiques actuelles, la technologie fournit sa plate-forme de gestion de contenu \u00e0 environ 35% de tous les internautes. La technologie a toujours attir\u00e9 hackers et cyber-attaquants en raison de son nombre impressionnant d&rsquo;installations. C&rsquo;est pourquoi les tentatives de piratage sur les &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"WordPress est certainement la plateforme de cr\u00e9ation de sites la plus populaire. Selon les statistiques actuelles, la technologie fournit sa plate-forme de gestion de contenu \u00e0 environ 35% de tous les internautes. La technologie a toujours attir\u00e9 hackers et cyber-attaquants en raison de son nombre impressionnant d&rsquo;installations. C&rsquo;est pourquoi les tentatives de piratage sur les &hellip; Continue reading PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-02T06:43:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-03T06:46:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY\",\"datePublished\":\"2020-03-02T06:43:38+00:00\",\"dateModified\":\"2020-03-03T06:46:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/\"},\"wordCount\":956,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/\",\"name\":\"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-03-02T06:43:38+00:00\",\"dateModified\":\"2020-03-03T06:46:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/","og_locale":"fr_FR","og_type":"article","og_title":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS","og_description":"WordPress est certainement la plateforme de cr\u00e9ation de sites la plus populaire. Selon les statistiques actuelles, la technologie fournit sa plate-forme de gestion de contenu \u00e0 environ 35% de tous les internautes. La technologie a toujours attir\u00e9 hackers et cyber-attaquants en raison de son nombre impressionnant d&rsquo;installations. C&rsquo;est pourquoi les tentatives de piratage sur les &hellip; Continue reading PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY","og_url":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-03-02T06:43:38+00:00","article_modified_time":"2020-03-03T06:46:47+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY","datePublished":"2020-03-02T06:43:38+00:00","dateModified":"2020-03-03T06:46:47+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/"},"wordCount":956,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/","url":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/","name":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","datePublished":"2020-03-02T06:43:38+00:00","dateModified":"2020-03-03T06:46:47+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/plusieurs-plugins-wordpress-compromis-par-des-hackers-utilisant-des-failles-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"PLUSIEURS PLUGINS WORDPRESS COMPROMIS PAR DES HACKERS UTILISANT DES FAILLES ZERO-DAY"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/03\/Plugin-Vulnerably-in-WordPress-could-give-Hackers-Total-Control-Over-Your-Site.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-sN","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1785"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1785\/revisions"}],"predecessor-version":[{"id":1787,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1785\/revisions\/1787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1786"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}